article thumbnail

Chinese Hacking Contractor iSoon Leaks Internal Documents

Data Breach Today

Company Mainly Hacked for the Ministry of Public Security An apparent leak of internal documents from a Chinese hacking contractor paints a picture of a disaffected, poorly paid workforce that nonetheless penetrated multiple regional governments and possibly NATO.

article thumbnail

OneSpan to Buy ProvenDB to Securely Store, Vault Documents

Data Breach Today

The Australian Startup Uses Blockchain To Stop Data Tampering, Document Alteration OneSpan plans to purchase an Australian startup founded by a longtime Quest Software executive to securely store and vault documents based on blockchain technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Going beyond watermarks to protect sensitive documents from illegal access

The Last Watchdog

As a result, The majority of businesses (55 percent) are using some sort of a tool to monitor for insider threats; including data leak prevention (DLP) software (54 percent), user behavior analytics (UBA) software (50 percent), and employee monitoring and surveillance (47 percent). There are more exotic ways of protecting documents.

Access 277
article thumbnail

Fulton County, Security Experts Call LockBit’s Bluff

Krebs on Security

they could expect to see their internal documents published online this morning unless the county paid a ransom demand. Security experts say LockBit was likely bluffing and probably lost most of the data when the gang’s servers were seized this month by U.S. They could release whatever data they have at any time.

Security 240
article thumbnail

Updating your data protection documentation following Brexit

IT Governance

The UK data protection landscape is a lot more complex following Brexit. Many organisations are now subject to both the EU GDPR (General Data Protection Regulation) and the UK GDPR (General Data Protection). Do you have appropriate security mechanisms for data transfers?

GDPR 144
article thumbnail

NEW TECH: DigiCert Document Signing Manager leverages PKI to advance electronic signatures

The Last Watchdog

Related: Why PKI will endure as the Internet’s secure core. Yet electronic signatures do have their security limitations. Trzupek outlined how DSM allows for legally-binding documents with auditability and management of signers. “It That’s what Document Signing Manager does.

article thumbnail

US Physics Laboratory Exposed Documents, Credentials

Data Breach Today

has tidied up its systems after security researchers found weaknesses exposing documents, proprietary applications, personal information, project details and credentials. The findings come from the Sakura Samurai security research group.

Security 237